US7613195B2 - Method and system for managing computer networks - Google Patents

Method and system for managing computer networks Download PDF

Info

Publication number
US7613195B2
US7613195B2 US10/694,651 US69465103A US7613195B2 US 7613195 B2 US7613195 B2 US 7613195B2 US 69465103 A US69465103 A US 69465103A US 7613195 B2 US7613195 B2 US 7613195B2
Authority
US
United States
Prior art keywords
node
network
port
tcp
communicating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US10/694,651
Other versions
US20050089028A1 (en
Inventor
Samuel P. Hopkins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Priority to US10/694,651 priority Critical patent/US7613195B2/en
Assigned to MARCONI COMMUNICATIONS, INC. reassignment MARCONI COMMUNICATIONS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HOPKINS, SAMUEL P.
Assigned to MARCONI INTELLECTUAL PROPERTY (RINGFENCE), INC. reassignment MARCONI INTELLECTUAL PROPERTY (RINGFENCE), INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MARCONI COMMUNICATIONS, INC.
Priority to EP04256466A priority patent/EP1528748A1/en
Priority to JP2004310353A priority patent/JP2005130511A/en
Publication of US20050089028A1 publication Critical patent/US20050089028A1/en
Assigned to ERICSSON AB reassignment ERICSSON AB ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MARCONI INTELLECTUAL PROPERTY (RINGFENCE) INC.
Application granted granted Critical
Publication of US7613195B2 publication Critical patent/US7613195B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/0273Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP]
    • H04L41/0293Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP] for accessing web services by means of a binding identification of the management service or element
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/663Transport layer addresses, e.g. aspects of transmission control protocol [TCP] or user datagram protocol [UDP] ports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type

Definitions

  • the present invention is related to the monitoring and managing of computer networks. More specifically, the present invention is related to the monitoring and managing of computer networks and other devices securely over the Internet.
  • Cost Reduction & ROI Normally remote management of networks and other devices are handled through the use of frame-relay or other dedicated circuits. These costs are substantial and sometimes cost restrictive. This invention utilizes an existing Internet connection which reduces costs through the elimination of the dedicated circuit.
  • VPN Internet Protocol Security
  • NAT Network Address Translation
  • Decreased Installation Time Normally remote network and device management is done via a frame-relay or other dedicated circuit. Normal installation times for these circuits are 60-90 days. This invention utilizes an existing Internet connection and significantly reduces the amount of time it takes to start the management of networks and devices.
  • the present invention pertains to a telecommunication system.
  • the system comprises a first network having a first node and a second node which can communicate with each other.
  • the system comprises a third node separate and apart from the first network.
  • the system comprises a communication portion in communication with the first network and the third node through which the third node is only able to communicate with the first node, but not with the second node through the first node.
  • the present invention pertains to a telecommunication system using the Internet.
  • the system comprises a first network having a first node having a first port, a second node having a second port and a primary server in communication with each other.
  • the system comprises a second network having a third node and a fourth node and a client server in communication with each other.
  • the third node has a connection with the port of the first node via the client server and through the Internet and the primary server using gateway methodology so the second node cannot be accessed by the third node through the first node.
  • the present invention pertains to a method for telecommunications.
  • the method comprises the steps of communicating between a first node of a first network and a second node of the second network. There is the step of communicating between a third node separate and apart from the first network through a communication portion and the first node but not the second node through the first node.
  • FIG. 1 is a schematic representation of a system of the present invention.
  • FIG. 2 is a schematic representation of an alternative embodiment of a system of the present invention.
  • the system 10 comprises a first network 12 having a first node 14 and a second node 16 which can communicate with each other.
  • the system 10 comprises a third node 18 separate and apart from the first network 12 .
  • the system 10 comprises a communication portion 22 in communication with the first network 12 and the third node 18 through which the third node 18 is only able to communicate with the first node 14 , but not with the second node 16 through the first node.
  • the first node 14 has a first port 24 and the third node 18 has a second port 26 , and wherein the third node 18 only communicates with the first port 24 of the first node 14 through the communication portion 22 .
  • the communication portion 22 preferably includes the Internet 28 .
  • the third node 18 forms a connection with the first node 14 through an Internet 28 of the communication portion 22 .
  • a second network 30 having the third node 18 and a fourth node 20 which can communicate with each other but only with the first node 14 or the second node 16 through individual connections through the first port 24 of the first node 14 or the second port 26 of the third node 18 , respectively.
  • the first network 12 monitors and manages the second network 30 .
  • the present invention pertains to a telecommunication system 10 using the Internet 28 , as shown in FIG. 2 .
  • the system 10 comprises a first network 12 having a first node 14 having a first port 24 , a second node 16 and a primary server 32 in communication with each other.
  • the system 10 comprises a second network 30 having a third node 18 having a second port 26 and a fourth node 20 and a client server 34 in communication with each other.
  • the third node 18 has a connection with the port of the first node 14 via the client server 34 and through the Internet 28 and the primary server 32 using gateway methodology so the second node 16 cannot be accessed by the third node 18 through the first node.
  • the client server 34 encrypts data from the third node 18 on the connection and the primary server 32 decrypts data for the first node 14 .
  • the first network 12 preferably monitors and manages the second network 30 .
  • the present invention pertains to a method for telecommunications.
  • the method comprises the steps of communicating between a first node 14 of a first network 12 and a second node 16 of the first network 12 .
  • the third node 18 communicating step includes the step of communicating between the third node 18 and only with a first port 24 of the first node 14 through the communication portion 22 .
  • the third node 18 communicating step preferably includes the step of communicating between the third node 18 and the first node 14 through an Internet 28 of the communication portion 22 .
  • the system 10 and method provides for monitoring and managing computer networks and other devices over the Internet 28 .
  • Computer networks formed of computers and other devices are managed over a communication network which may include all or part of the Internet 28 , via TCP/IP port extension using gateway methodology. It does not utilize VPN technology but rather it extends specifically selected TCP/IP ports through the communication network.
  • the remote side there is client software located on a first device.
  • server software located on a second device that accepts connections from the first device.
  • This connection is over a specific TCP/IP port from the client to the server and over some communications network which may include all or part of the Internet 28 .
  • This TCP/IP port is predefined by an administrator and will remain constant and cannot be changed unless both the client and server are physically changed.
  • the TCP/IP communication connection is established at some point and remains open as long as a communication path is required. When information must pass from the first device to the second device, it can be encrypted on the client side for added security. The server side would then receive this information and decrypt it.
  • the first device may be configured to accept information from a third locally attached device to be passed onto the second device. It is important to note, however, that the third device has no way to directly access the second device—rather, it must pass information to the first device to be transmitted.
  • the first device is acting as a gateway. The third device cannot utilize any port between the first and second device except for the TCP/IP port that has been predefined from the first to second device and only if it is allowed to by the first device.
  • This connection technique is extremely secure because it merely extends TCP/IP ports and does not connect the two networks together.
  • Current methods of managing networks and devices over the Internet 28 utilize VPN technologies.
  • all network data passing between the networks is encrypted but all TCP/IP information can pass from one network to another and from any device to any device from any TCP/IP port to any TCP/IP port unrestricted. This means that should an intruder compromise one network, they then have access to the second network 30 because they are seamlessly connected.
  • This system 10 and method provides a way of connecting remote networks and devices for management that does not allow all TCP/IP information to pass.
  • This system 10 and method provides no way for an intruder to comprise a network should they gain access to the other except for the specifically defined TCP/IP port.
  • VPN When two networks are connected together via VPN, a person on node A of network A can access a TCP/IP port of nodes B, C or D of network B unrestricted. Meaning node A of network A can access payroll files on node B of network B, HR information on node C of network B, or the website located on node B of network B without any modification or special configuration of node A of network A.
  • TCP/IP port extension When two networks are connected together via TCP/IP port extension, node A of network A can only access a specific TCP/IP port of node B on network B. Meaning node A of network A can only access the website located on node B of network B but not the payroll files on node B of network B or HR information located on node C of network B. Furthermore, if there are any other services running on a different TCP/IP port of node D of network B node A of network A cannot access them because node A of network A is only able to connect to a single specific TCP/IP port of node D of network B (assuming it was configured to reach only the website).
  • remote networks are monitored by placing a polling station onto the remote network to monitor remote devices. As error conditions are detected, this polling station sends information back to a primary location for resolution. Normally, the network connectivity between the polling station and primary location is over a frame-relay circuit or some other leased line for security reasons. Sending this information over an existing Internet connection poses a security risk that most companies will not take because the information is unencrypted. In prior art, the solution was to connect both networks via a VPN, which does encrypt the information. While VPNs solve the encryption problem, they bring their own inherent problems with them. VPNs connect two networks together and allow full TCP/IP traffic to pass. Should an intruder compromise one network, they can gain access to the second network.
  • the system 10 solves the problems of sending unencrypted information over the Internet and the problems brought on by VPNs.
  • the polling station has client software placed on it that makes a TCP/IP connection to its server counter part on the primary side. All data that passes over this communication port is encrypted by the client and decrypted by the server and effectively creates a secure connection. Because both networks are not connected together, as you would find in a VPN, there is no way to comprise the second network.
  • Polling Station A on network A detects that node A of network A is unavailable and generates an alarm. It passes this alarm to the port extension software located on the same device. This software takes the information, encrypts it, and sends it to the primary side server counterpart. This primary server counterpart receives the information, decrypts it and then either passes it along to another node or processes it itself.

Abstract

A telecommunication system includes a first network having a first node and a second node which can communicate with each other. The system includes a third node separate and apart from the first network. The system includes a communication portion in communication with the first network and the third node through which the third node is only able to communicate with the first node, but not with the second node through the first node. A telecommunication system using the Internet includes a first network having a first node having a first port, a second node having a second port and a primary server in communication with each other. The system includes a second network having a third node and a fourth node and a client server in communication with each other. The third node has a connection with the port of the first node via the client server and through the Internet and the primary server using gateway methodology so the second node cannot be accessed by the third node through the first node. The present invention pertains to a method for telecommunications.

Description

FIELD OF THE INVENTION
The present invention is related to the monitoring and managing of computer networks. More specifically, the present invention is related to the monitoring and managing of computer networks and other devices securely over the Internet.
BACKGROUND OF THE INVENTION
Cost Reduction & ROI—Normally remote management of networks and other devices are handled through the use of frame-relay or other dedicated circuits. These costs are substantial and sometimes cost restrictive. This invention utilizes an existing Internet connection which reduces costs through the elimination of the dedicated circuit.
Security—When networks are connected to each other over the Internet they rely on VPN technologies. VPN technologies connect two networks together and allow full traffic to be transmitted from one to another. This poses security risks should an intruder compromise one network because both networks are connected together. Furthermore, managed service providers are at an increased risk because they generally do not own the remote network and cannot control its security practices. This invention connects two networks together for network and device management by extending specific TCP/IP ports. Security risks are eliminated because both networks do not have a full traffic connection.
NAT—Many networks utilize Network Address Translation (NAT) because of the limited IP addresses available on the Internet. NAT allows companies to utilize a non-routable private IP address range for their network while only utilizing one single routable public IP address. NAT works by monitoring and replacing the private IP address with the public IP address of any network packets destined for Internet addresses. NAT and VPN are not compatible because of the way NAT replaces IP addresses. This invention solves remote management of networks and other devices when the remote network utilizes NAT because IP replacement does not affect its operation.
Decreased Installation Time—Normally remote network and device management is done via a frame-relay or other dedicated circuit. Normal installation times for these circuits are 60-90 days. This invention utilizes an existing Internet connection and significantly reduces the amount of time it takes to start the management of networks and devices.
SUMMARY OF THE INVENTION
The present invention pertains to a telecommunication system. The system comprises a first network having a first node and a second node which can communicate with each other. The system comprises a third node separate and apart from the first network. The system comprises a communication portion in communication with the first network and the third node through which the third node is only able to communicate with the first node, but not with the second node through the first node.
The present invention pertains to a telecommunication system using the Internet. The system comprises a first network having a first node having a first port, a second node having a second port and a primary server in communication with each other. The system comprises a second network having a third node and a fourth node and a client server in communication with each other. The third node has a connection with the port of the first node via the client server and through the Internet and the primary server using gateway methodology so the second node cannot be accessed by the third node through the first node.
The present invention pertains to a method for telecommunications. The method comprises the steps of communicating between a first node of a first network and a second node of the second network. There is the step of communicating between a third node separate and apart from the first network through a communication portion and the first node but not the second node through the first node.
BRIEF DESCRIPTION OF THE DRAWINGS
In the accompanying drawings, the preferred embodiment of the invention and preferred methods of practicing the invention are illustrated in which:
FIG. 1 is a schematic representation of a system of the present invention.
FIG. 2 is a schematic representation of an alternative embodiment of a system of the present invention.
DETAILED DESCRIPTION
Referring now to the drawings wherein like reference numerals refer to similar or identical parts throughout the several views, and more specifically to FIG. 1 thereof, there is shown a telecommunication system 10. The system 10 comprises a first network 12 having a first node 14 and a second node 16 which can communicate with each other. The system 10 comprises a third node 18 separate and apart from the first network 12. The system 10 comprises a communication portion 22 in communication with the first network 12 and the third node 18 through which the third node 18 is only able to communicate with the first node 14, but not with the second node 16 through the first node.
Preferably, the first node 14 has a first port 24 and the third node 18 has a second port 26, and wherein the third node 18 only communicates with the first port 24 of the first node 14 through the communication portion 22. The communication portion 22 preferably includes the Internet 28. Preferably, the third node 18 forms a connection with the first node 14 through an Internet 28 of the communication portion 22.
There is preferably a second network 30 having the third node 18 and a fourth node 20 which can communicate with each other but only with the first node 14 or the second node 16 through individual connections through the first port 24 of the first node 14 or the second port 26 of the third node 18, respectively. Preferably, the first network 12 monitors and manages the second network 30.
The present invention pertains to a telecommunication system 10 using the Internet 28, as shown in FIG. 2. The system 10 comprises a first network 12 having a first node 14 having a first port 24, a second node 16 and a primary server 32 in communication with each other. The system 10 comprises a second network 30 having a third node 18 having a second port 26 and a fourth node 20 and a client server 34 in communication with each other. The third node 18 has a connection with the port of the first node 14 via the client server 34 and through the Internet 28 and the primary server 32 using gateway methodology so the second node 16 cannot be accessed by the third node 18 through the first node.
Preferably, the client server 34 encrypts data from the third node 18 on the connection and the primary server 32 decrypts data for the first node 14. The first network 12 preferably monitors and manages the second network 30.
The present invention pertains to a method for telecommunications. The method comprises the steps of communicating between a first node 14 of a first network 12 and a second node 16 of the first network 12. There is the step of communicating between a third node 18 separate and apart from the first network 12 through a communication portion 22 and the first node 14 but not the second node 16 through the first node.
Preferably, the third node 18 communicating step includes the step of communicating between the third node 18 and only with a first port 24 of the first node 14 through the communication portion 22. The third node 18 communicating step preferably includes the step of communicating between the third node 18 and the first node 14 through an Internet 28 of the communication portion 22.
Preferably, there are the steps of communicating between the third node 18 of a second network 30 and a fourth node 20 of the second network 30; and communicating between the first network 12 and the third and fourth nodes 18, 20 of the second network 30 only through individual connections through the first port 24 of the first node 14. There is preferably the step of monitoring and managing the second network 30 by the first network 12.
In the operation of the invention, the system 10 and method provides for monitoring and managing computer networks and other devices over the Internet 28.
Computer networks formed of computers and other devices are managed over a communication network which may include all or part of the Internet 28, via TCP/IP port extension using gateway methodology. It does not utilize VPN technology but rather it extends specifically selected TCP/IP ports through the communication network.
On the remote side (the second network) there is client software located on a first device. On the primary side (the first network) there is server software located on a second device that accepts connections from the first device. This connection is over a specific TCP/IP port from the client to the server and over some communications network which may include all or part of the Internet 28. This TCP/IP port is predefined by an administrator and will remain constant and cannot be changed unless both the client and server are physically changed. The TCP/IP communication connection is established at some point and remains open as long as a communication path is required. When information must pass from the first device to the second device, it can be encrypted on the client side for added security. The server side would then receive this information and decrypt it. The first device may be configured to accept information from a third locally attached device to be passed onto the second device. It is important to note, however, that the third device has no way to directly access the second device—rather, it must pass information to the first device to be transmitted. The first device is acting as a gateway. The third device cannot utilize any port between the first and second device except for the TCP/IP port that has been predefined from the first to second device and only if it is allowed to by the first device.
This connection technique is extremely secure because it merely extends TCP/IP ports and does not connect the two networks together. Current methods of managing networks and devices over the Internet 28 utilize VPN technologies. In a VPN, all network data passing between the networks is encrypted but all TCP/IP information can pass from one network to another and from any device to any device from any TCP/IP port to any TCP/IP port unrestricted. This means that should an intruder compromise one network, they then have access to the second network 30 because they are seamlessly connected. This system 10 and method provides a way of connecting remote networks and devices for management that does not allow all TCP/IP information to pass. This system 10 and method provides no way for an intruder to comprise a network should they gain access to the other except for the specifically defined TCP/IP port.
EXAMPLE
VPN—When two networks are connected together via VPN, a person on node A of network A can access a TCP/IP port of nodes B, C or D of network B unrestricted. Meaning node A of network A can access payroll files on node B of network B, HR information on node C of network B, or the website located on node B of network B without any modification or special configuration of node A of network A.
TCP/IP port extension—When two networks are connected together via TCP/IP port extension, node A of network A can only access a specific TCP/IP port of node B on network B. Meaning node A of network A can only access the website located on node B of network B but not the payroll files on node B of network B or HR information located on node C of network B. Furthermore, if there are any other services running on a different TCP/IP port of node D of network B node A of network A cannot access them because node A of network A is only able to connect to a single specific TCP/IP port of node D of network B (assuming it was configured to reach only the website).
Normally, remote networks are monitored by placing a polling station onto the remote network to monitor remote devices. As error conditions are detected, this polling station sends information back to a primary location for resolution. Normally, the network connectivity between the polling station and primary location is over a frame-relay circuit or some other leased line for security reasons. Sending this information over an existing Internet connection poses a security risk that most companies will not take because the information is unencrypted. In prior art, the solution was to connect both networks via a VPN, which does encrypt the information. While VPNs solve the encryption problem, they bring their own inherent problems with them. VPNs connect two networks together and allow full TCP/IP traffic to pass. Should an intruder compromise one network, they can gain access to the second network. Furthermore, when two different companies are connected as in the case of Company A and a managed service provider, the risks are compounded because neither company controls the security practices of the other. The system 10 solves the problems of sending unencrypted information over the Internet and the problems brought on by VPNs. With the system 10, the polling station has client software placed on it that makes a TCP/IP connection to its server counter part on the primary side. All data that passes over this communication port is encrypted by the client and decrypted by the server and effectively creates a secure connection. Because both networks are not connected together, as you would find in a VPN, there is no way to comprise the second network.
EXAMPLE
Polling Station A on network A detects that node A of network A is unavailable and generates an alarm. It passes this alarm to the port extension software located on the same device. This software takes the information, encrypts it, and sends it to the primary side server counterpart. This primary server counterpart receives the information, decrypts it and then either passes it along to another node or processes it itself.
Although the invention has been described in detail in the foregoing embodiments for the purpose of illustration, it is to be understood that such detail is solely for that purpose and that variations can be made therein by those skilled in the art without departing from the spirit and scope of the invention except as it may be described by the following claims.

Claims (13)

1. A telecommunication system comprising:
a first network having a primary server and a first node with a first TCP/IP port and a second node, and a second network having a client server and a third node with a second TCP/IP port which can communicate with the first TCP/IP port, the first TCP/IP port and the second TCP/IP port having been predefined by an administrator, wherein the first TCP/IP port and the second TCP/IP port remain constant and cannot be changed unless both the client server and the primary server are physically changed;
a communication portion in communication with the first network and the third node and through which the third node is only able to communicate with the first TCP/IP port of the first node via TCP/IP port extension using gateway methodology, such that the second node cannot be accessed by the third node; and
wherein the system is configured such that the third node cannot utilize any port between the first node and the third node except for the first and second TCP/IP ports, the third node able to communicate with the second node only if the third node is allowed to by the first node which prevents an intruder who compromises the second network from gaining access to the first network except for the first TCP/IP port.
2. A system as claimed in claim 1 wherein the communication portion includes the Internet.
3. A system as claimed in claim 2 wherein the third node forms a connection with the first node through an Internet of the communication portion.
4. A system as claimed in claim 3 wherein the second network has the third node and a fourth node which can communicate with each other but only with the first node or the second node through individual connections through the first port of the first node or the second port of the second node, respectively.
5. A system as claimed in claim 4 wherein the first network monitors and manages the second network.
6. A system as claimed in claim 1, and configured for using the Internet, comprising:
the first network having the primary server in communication with the first node and the second node; and
the second network having a fourth node and the client server in communication with each other and the third node, the third node having a connection with the port of the first node via the client server and through the Internet and the primary server using gateway methodology so the second node cannot be accessed by the third node through the first node.
7. A system as claimed in claim 6 wherein the client server encrypts data from the third node on the connection and the primary server decrypts data for the first node.
8. A system as claimed in claim 7 wherein the first network monitors and manages the second network.
9. A method for telecommunications comprising the steps of:
communicating between a first node of a first network and a third node of a second network, the first node having a first TCP/IP port and the third node having a second TCP/IP port, the first TCP/IP port and the second TCP/IP port having been predefined by an administrator, wherein the first TCP/IP port and the second TCP/IP port will remain constant and cannot be changed unless both a client server of the second network and a primary server of the first network are physically changed; and
communicating between the first network and the third node of the second network, separate and apart from the first network, through a communication portion through which the third node is only able to communicate with the first TCP/IP port of the first node via TCP/IP port extension using gateway methodology, such that a second node of the first network cannot be accessed by the third node through the first node;
wherein the third node cannot utilize any port between the first node and the third node except for the first and second TCP/IP ports, the third node able to communicate with the second node only if the third node is allowed to by the first node which prevents an intruder who compromises the second network from gaining access to the first network except for the first TCP/IP port.
10. A method as claimed in claim 9 wherein the third node communicating step includes the step of communicating between the third node and only with a first port of the first node through the communication portion.
11. A method as claimed in claim 10 wherein the third node communicating step includes the step of communicating between the third node and the first node through an Internet of the communication portion.
12. A method as claimed in claim 11 including the steps of communicating between the third node of the second network and a fourth node of the second network; and communicating between the first network and the third and fourth nodes of the second network only through individual connections through the first port of the first node or the second port of the second node, respectively.
13. A method as claimed in claim 12 including the step of monitoring and managing the second network by the first network.
US10/694,651 2003-10-27 2003-10-27 Method and system for managing computer networks Active 2025-11-12 US7613195B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/694,651 US7613195B2 (en) 2003-10-27 2003-10-27 Method and system for managing computer networks
EP04256466A EP1528748A1 (en) 2003-10-27 2004-10-20 Method and system for managing computer networks
JP2004310353A JP2005130511A (en) 2003-10-27 2004-10-26 Computer network management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/694,651 US7613195B2 (en) 2003-10-27 2003-10-27 Method and system for managing computer networks

Publications (2)

Publication Number Publication Date
US20050089028A1 US20050089028A1 (en) 2005-04-28
US7613195B2 true US7613195B2 (en) 2009-11-03

Family

ID=34423342

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/694,651 Active 2025-11-12 US7613195B2 (en) 2003-10-27 2003-10-27 Method and system for managing computer networks

Country Status (3)

Country Link
US (1) US7613195B2 (en)
EP (1) EP1528748A1 (en)
JP (1) JP2005130511A (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079537B (en) * 2013-03-28 2018-03-23 联想(北京)有限公司 A kind of method, apparatus and system that session connection is established based on transmission control protocol
US20180124150A1 (en) * 2016-10-28 2018-05-03 T-Mobile Usa, Inc. Remote access of cellular communication devices for software development and testing
US10616781B2 (en) 2017-06-14 2020-04-07 T-Mobile Usa, Inc. Device-based diagnostic network testing
US10664388B2 (en) 2017-06-14 2020-05-26 T-Mobile Usa, Inc. Continuous integration testing for network-based applications
US10382922B2 (en) 2017-06-14 2019-08-13 T-Mobile Usa, Inc. Distributed testing of wireless networks

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6044402A (en) * 1997-07-02 2000-03-28 Iowa State University Research Foundation Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections
US6134591A (en) 1997-06-18 2000-10-17 Client/Server Technologies, Inc. Network security and integration method and system
WO2001006726A2 (en) 1999-07-15 2001-01-25 Sun Microsystems, Inc. Secure network switch
EP1202494A2 (en) 2000-10-31 2002-05-02 Marconi Communications, Inc. Method and system for remotely maintaining and provisioning equipment over a wide area network
WO2002076017A2 (en) 2001-03-20 2002-09-26 Marconi Uk Intellectual Property Ltd Access networks
US20030131263A1 (en) * 2001-03-22 2003-07-10 Opeanreach, Inc. Methods and systems for firewalling virtual private networks
WO2003060671A2 (en) 2002-01-04 2003-07-24 Lab 7 Networks, Inc. Communication security system
US20030147403A1 (en) * 2002-01-28 2003-08-07 John Border Method and system for communicating over a segmented virtual private network (VPN)
US20030152067A1 (en) * 2002-02-08 2003-08-14 Enterasys Networks, Inc. Controlling concurrent usage of network resources by multiple users at an entry point to a communications network based on identities of the users
US20030163920A1 (en) * 2002-02-06 2003-09-04 Benteler Automobiltechnik Gmbh & Co. Kg Method of making a structural member for use in the automobile industry
US20030171852A1 (en) 2000-05-09 2003-09-11 Vasco Vollmer Method for accessing a device belonging to a communications network in an automobile through an external device, and gateway
US6662221B1 (en) * 1999-04-12 2003-12-09 Lucent Technologies Inc. Integrated network and service management with automated flow through configuration and provisioning of virtual private networks
US20040088571A1 (en) * 2002-01-31 2004-05-06 John Jerrim Network service zone locking
US20040090972A1 (en) * 2001-04-12 2004-05-13 Barrett Mark A Hybrid network
US20040160903A1 (en) * 2003-02-13 2004-08-19 Andiamo Systems, Inc. Security groups for VLANs
US20040223499A1 (en) * 2003-05-08 2004-11-11 Onvoy, Inc. Communications networks with converged services
US20040264402A9 (en) * 1995-06-01 2004-12-30 Padcom. Inc. Port routing functionality
US6937574B1 (en) * 1999-03-16 2005-08-30 Nortel Networks Limited Virtual private networks and methods for their operation
US7124197B2 (en) * 2002-09-11 2006-10-17 Mirage Networks, Inc. Security apparatus and method for local area networks
US7457290B1 (en) * 1998-08-25 2008-11-25 Cisco Technology, Inc. Method and apparatus for automatic inter-domain routing of calls

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6772226B1 (en) * 2000-08-15 2004-08-03 Avaya Technology Corp. VPN device clustering using a network flow switch and a different mac address for each VPN device in the cluster
JP3775196B2 (en) * 2000-09-29 2006-05-17 株式会社日立製作所 Network access control device, control method thereof, control system thereof, and communication service method
JP2002152279A (en) * 2000-11-10 2002-05-24 Sony Corp Network access controller and its method
JP2002236627A (en) * 2001-02-08 2002-08-23 Yaskawa Electric Corp Method for changing dynamic port of firewall
WO2002067512A1 (en) * 2001-02-19 2002-08-29 Fujitsu Limited Packet filtering method and packet communication system for ensuring communication security
JP4237055B2 (en) * 2001-09-28 2009-03-11 ファイバーリンク コミュニケーションズ コーポレーション Client-side network access policy and management application
JP2003271474A (en) * 2002-03-13 2003-09-26 Fujitsu Ltd Method for preventing illegal invasion from external network and program

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040264402A9 (en) * 1995-06-01 2004-12-30 Padcom. Inc. Port routing functionality
US6134591A (en) 1997-06-18 2000-10-17 Client/Server Technologies, Inc. Network security and integration method and system
US6044402A (en) * 1997-07-02 2000-03-28 Iowa State University Research Foundation Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections
US7457290B1 (en) * 1998-08-25 2008-11-25 Cisco Technology, Inc. Method and apparatus for automatic inter-domain routing of calls
US6937574B1 (en) * 1999-03-16 2005-08-30 Nortel Networks Limited Virtual private networks and methods for their operation
US6662221B1 (en) * 1999-04-12 2003-12-09 Lucent Technologies Inc. Integrated network and service management with automated flow through configuration and provisioning of virtual private networks
WO2001006726A2 (en) 1999-07-15 2001-01-25 Sun Microsystems, Inc. Secure network switch
US20030171852A1 (en) 2000-05-09 2003-09-11 Vasco Vollmer Method for accessing a device belonging to a communications network in an automobile through an external device, and gateway
EP1202494A2 (en) 2000-10-31 2002-05-02 Marconi Communications, Inc. Method and system for remotely maintaining and provisioning equipment over a wide area network
WO2002076017A2 (en) 2001-03-20 2002-09-26 Marconi Uk Intellectual Property Ltd Access networks
US20030131263A1 (en) * 2001-03-22 2003-07-10 Opeanreach, Inc. Methods and systems for firewalling virtual private networks
US20040090972A1 (en) * 2001-04-12 2004-05-13 Barrett Mark A Hybrid network
WO2003060671A2 (en) 2002-01-04 2003-07-24 Lab 7 Networks, Inc. Communication security system
US20030147403A1 (en) * 2002-01-28 2003-08-07 John Border Method and system for communicating over a segmented virtual private network (VPN)
US20040088571A1 (en) * 2002-01-31 2004-05-06 John Jerrim Network service zone locking
US20030163920A1 (en) * 2002-02-06 2003-09-04 Benteler Automobiltechnik Gmbh & Co. Kg Method of making a structural member for use in the automobile industry
US20030152067A1 (en) * 2002-02-08 2003-08-14 Enterasys Networks, Inc. Controlling concurrent usage of network resources by multiple users at an entry point to a communications network based on identities of the users
US7124197B2 (en) * 2002-09-11 2006-10-17 Mirage Networks, Inc. Security apparatus and method for local area networks
US20040160903A1 (en) * 2003-02-13 2004-08-19 Andiamo Systems, Inc. Security groups for VLANs
US20040223499A1 (en) * 2003-05-08 2004-11-11 Onvoy, Inc. Communications networks with converged services

Also Published As

Publication number Publication date
EP1528748A1 (en) 2005-05-04
US20050089028A1 (en) 2005-04-28
JP2005130511A (en) 2005-05-19

Similar Documents

Publication Publication Date Title
US8019850B2 (en) Virtual private network management
US20020083344A1 (en) Integrated intelligent inter/intra networking device
US6131120A (en) Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers
US7536715B2 (en) Distributed firewall system and method
EP1515491B1 (en) Architecture for virtual private networks
US8418241B2 (en) Method and system for traffic engineering in secured networks
US7392537B2 (en) Managing a network security application
US7739729B2 (en) Electronic security system and scheme for a communications network
US8607301B2 (en) Deploying group VPNS and security groups over an end-to-end enterprise network
US10097523B2 (en) Method and system for providing secure remote external client access to device or service on a remote network
EP1134955A1 (en) Enterprise network management using directory containing network addresses of users and devices providing access lists to routers and servers
US20050174937A1 (en) Surveillance implementation in managed VOP networks
US20070294253A1 (en) Secure domain information protection apparatus and methods
WO2008039506B1 (en) Deploying group vpns and security groups over an end-to-end enterprise network and ip encryption for vpns
US20050086533A1 (en) Method and apparatus for providing secure communication
US7613195B2 (en) Method and system for managing computer networks
US20030196082A1 (en) Security management system
Nessett et al. The multilayer firewall
Seneviratne et al. Integrated Corporate Network Service Architecture for Bring Your Own Device (BYOD) Policy
WO2003003664A1 (en) System and method for address and key distribution in virtual networks
EP1413095A1 (en) System and method for providing services in virtual private networks
Hares et al. Interface to the Routing System (I2RS) Security-Related Requirements
Hares et al. RFC 8241: Interface to the Routing System (I2RS) Security-Related Requirements
EP4323898A1 (en) Computer-implemented methods and systems for establishing and/or controlling network connectivity
TIB Virtual Private Networks and Their Use in Support of National Security and Emergency Preparedness (NS/EP)

Legal Events

Date Code Title Description
AS Assignment

Owner name: MARCONI COMMUNICATIONS, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HOPKINS, SAMUEL P.;REEL/FRAME:014654/0847

Effective date: 20031027

AS Assignment

Owner name: MARCONI INTELLECTUAL PROPERTY (RINGFENCE), INC., P

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MARCONI COMMUNICATIONS, INC.;REEL/FRAME:014721/0783

Effective date: 20040405

AS Assignment

Owner name: ERICSSON AB,SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MARCONI INTELLECTUAL PROPERTY (RINGFENCE) INC.;REEL/FRAME:018047/0028

Effective date: 20060101

Owner name: ERICSSON AB, SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MARCONI INTELLECTUAL PROPERTY (RINGFENCE) INC.;REEL/FRAME:018047/0028

Effective date: 20060101

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12